Keyphrases
- hidden markov models
- intrusion detection
- rough sets
- rough set theory
- data mining
- intrusion detection system
- network security
- anomaly detection
- decision rules
- attribute reduction
- information security
- pattern recognition
- data analysis
- decision table
- object recognition
- machine learning
- maximum likelihood
- expectation maximization
- databases
- data mining techniques
- neural network